Bug 1486400 (CVE-2017-13711) - CVE-2017-13711 QEMU: Slirp: use-after-free when sending response
Summary: CVE-2017-13711 QEMU: Slirp: use-after-free when sending response
Status: NEW
Alias: CVE-2017-13711
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
(Show other bugs)
Version: unspecified
Hardware: All Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=low,public=20170803,reported=2...
Keywords: Security
Depends On: 1486401 1508739 1508742 1508743 1508744 1508745 1508746 1508747 1508748 1508749 1508750 1508751 1508752 1508753 1509208 1520690
Blocks: 1462816 1520691
TreeView+ depends on / blocked
 
Reported: 2017-08-29 16:07 UTC by Prasad J Pandit
Modified: 2018-09-07 04:54 UTC (History)
42 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A use-after-free issue was found in the Slirp networking implementation of the Quick emulator (QEMU). It occurs when a Socket referenced from multiple packets is freed while responding to a message. A user/process could use this flaw to crash the QEMU process on the host resulting in denial of service.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:0816 None None None 2018-04-10 08:22 UTC
Red Hat Product Errata RHSA-2018:1104 None None None 2018-04-10 18:55 UTC
Red Hat Product Errata RHSA-2018:1113 None None None 2018-04-11 18:02 UTC

Description Prasad J Pandit 2017-08-29 16:07:25 UTC
Quick emulator(Qemu) built with the Slirp networking support is vulnerable
to an use-after-free issue. It occurs due to Socket referenced from multiple
packets is freed while responding to a message.

A user/process could use this flaw to crash the Qemu process on the host
resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg05201.html

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2017/08/29/6

Comment 1 Prasad J Pandit 2017-08-29 16:08:05 UTC
Acknowledgments:

Name: Wjjzhang (Tencent.com)

Comment 2 Prasad J Pandit 2017-08-29 16:09:12 UTC
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1486401]

Comment 3 Joshua Padman 2017-10-16 04:22:19 UTC
Changed openstack to affected / fix. We will be getting this from y-stream

Comment 4 Prasad J Pandit 2017-11-02 06:37:43 UTC
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1508739]

Comment 17 errata-xmlrpc 2018-04-10 08:22:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0816 https://access.redhat.com/errata/RHSA-2018:0816

Comment 18 errata-xmlrpc 2018-04-10 18:55:14 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for RHEL-7

Via RHSA-2018:1104 https://access.redhat.com/errata/RHSA-2018:1104

Comment 19 errata-xmlrpc 2018-04-11 18:02:18 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 10.0 (Newton)
  Red Hat OpenStack Platform 11.0 (Ocata)
  Red Hat OpenStack Platform 8.0 (Liberty)
  Red Hat OpenStack Platform 9.0 (Mitaka)
  Red Hat OpenStack Platform 12.0 (Pike)

Via RHSA-2018:1113 https://access.redhat.com/errata/RHSA-2018:1113


Note You need to log in before you can comment on or make changes to this bug.